iPhone and iOS Forensics Course Overview

COURSE LENGTH:

3-DAYS

This is a three-day course that profiles forensics functions for the Apple iPhone and the iOS operating system. This course is targeted towards those who have completed the InfoSec Computer Forensics Boot Camp or have relevant experience in the industry.

The most current, up-to-date hands-on forensics training available anywhere!

Proven Track Record—We have trained more computer forensics examiners than any other training company

Expert instructors, with PROVEN field experience (authors, ex-law enforcement, pioneers in the field)

We take pride in saying that all of our instructors are active and experienced at producing forensics work that is admissible in court

60% of Boot Camp is Hands On Training

You will learn the core forensics procedures necessary for performing thorough investigations on all iOS and HFS+ devices, with a domain focus on the iPhone

"I was blown away by the instructor's knowledge and expertise. ... Would recommend to anyone"

Connie Brown

United States Air Force

What You'll LEARN

If you already understand how to work with forensics and file carving then you should bring those skills to the next level. This program will help you to take your current skills and apply them to Apple iOS devices. You will learn about file carving with the iPhone and the HFS+ file system. You can also learn about the SSH format that may be used when looking through iOS devices. Information on how to jailbreak a phone is also covered.

If you already have a basic understanding of mobile forensics and file carving this course will help take your skills to the next level. You’ll learn about the HFS+ file system, how to browse the iOS devise withc SSH and common jail breaking techniques. In addition to all of this, you will learn to protect data for keychain items, analyze both iPhone and iCloud backups, recovering keyboard caches deleted libraries and how to write forensic reports.

Prerequisites

Students must have no criminal record. Computer forensic skills, including the ability or desire to work outside the Windows GUI interface, are necessary.

This is a very in depth training course and is not intended for individuals who have limited or no computer forensics skills.

See what our students are saying

"a must for any true security professional"

"This was a phenomenal class! The instructor was extremely knowledgeable and crafted the exercises so that we truly learned the material. I have a whole new appreciation for how vulnerabilities are exploited. I have gained very practical skills and knowledge in this class which will help me tremendously in my job. I will highly recommend this course to all of my co-workers. This class should be a must for any true security professional. There were several moments during the week when I was amazed at how vulnerable systems truly are. The practical labs and competition teams made the experience fun. I have learned some extremely valuable skills."

"hands-on experience was invaluable"

"The class was great! The instructor knew his his information very well. It was nice to have someone who is more than just book knowledge, someone who is just giving you the info for the cert test. His hands on experience in real world pen-testing was invaluable, as it gave a touch-stone to how the methods learned in class can be extended to real pen-testing."

"nice to have a dedicated training laptop provided"

"I got a lot out of the real world scenarios presented in class. Jeremy is very knowledgeable in the field of penetration testing. Would definitely take classes again if he is the instructor. The course books are a great reference, and it was nice to have a dedicated training laptop provided by Infosec and not have to bring my own and waste time installing programs during class"

"invaluable to my career"

"Dan is an excellent instructor and incredibly knowledgeable. Great presenter and very helpful. The course was very intense but well structured. The hours were long but it really allows you to get your head wrapped around it. Slide notes were very good as well as the lab pre-info. The labs tied well into the course. The content and knowledge gained will be invaluable to my career."

Instant Pricing

YOU ALSO GET

$3000 worth of tools and software!

InfoSec's Custom Hacking Tools Enterprise Suite, includes every program covered in the course for at home study. (558 Tools). Regular Price: Hacking Tools Enterprise Suite available for individual purchase for only $1,499!

Core Impact SEL License

Course Materials, Test Fees and Class Guarantees!

Small class sizes (usually 10-20 Students), you get an intimate learning setting not offered by any of our competitors.

5 Full Days of Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.

All meals, snacks and refreshments included. Snacks not included in Las Vegas courses.

InfoSec Institute's Ethical Hacking class is structured for maximum retention of knowledge learned in class. Because we believe in a commitment to your ongoing education after you attend a hands-on Ethical Hacking class, InfoSec Institute makes available for every student access to all of the Live Recorded lectures you attended in-class. These are available in online format for 30 days after the training session!

Other Related Tools & Resources For Our Students

Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued forensics training. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.

Humans are often the weakest link in the security chain. In his book The Art of Deception, renowned hacker Kevin Mitnick explains how innate human tendencies are exploited to the attacker’s advantage. It is a misconception that hackers seek to exploit convoluted vulnerabilities beyond comprehension of nontechnical employees. In fact, a meticulous hacker would begin […]

On August 31, 2014, news broke that nude photos of Jennifer Lawrence, Ariana Grande, Kate Upton, and other young female celebrities were being shared on 4chan. Jennifer Lawrence’s representative announced that the photos of her are real, Ariana Grande’s representative said hers are fake. As far as I can tell, the collection of photos are […]

Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was […]

Introduction Every analysis begins with specific goals in mind. As a forensics investigator, you are expected to know the type and importance of information you are looking for while investigating a computer crime. Computer forensics investigations involving a Windows box rely heavily on meticulous inspection of the keys, subkeys and relevant values that exist within […]

This article introduces Android forensics and the techniques used to perform Android forensic investigations. We will discuss Android file systems, data acquisition, analysis, and various tools available for Android Data Extraction. Introduction The smart phone market is growing higher and higher. With the drastic changes in technology, smart phones are becoming targets of criminals. Because […]